IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 6    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 6,June 2012
Cloud Data Security while using Third Party Auditor
Full Text(PDF, )  PP.38-41  
Author(s)
Abhishek Mohta and Lalit Kumar Awasthi
KEYWORDS
Third party Auditor, Integrity, Cloud Service Provider, Cloud Computing.
ABSTRACT
The Cloud is a plateform where all users not only store their data but also used the software and services provided by Cloud Service Provider (CSP). The service provided by the cloud is very economical. The user pay only for what he used.This is a platform where data owner remotely store their data in the cloud to enjoy the high quality applications and services. The user can access the data, use the data and store the data. In a Corporate world there are large number of client who accessing their data and modifying a data. In Cloud, application software and services are move to the centralized large data center and management of this data and services may not be trustworthy. To manage this data we use third party auditor (TPA).It will check the reliabilty of data but it increases the data integrity risk of data owner. Since TPA not only read the data but also he can modify the data, therefore a mechanism should be provided who solved this problem. We first examine the problem and new potential security scheme used to solve this problem. Our algorithm encrypt the content of file at user level which ensure the data owner and client that there data are intact. Side by side it also preserves the data dynamics and consistency of n number of client and server
References
[1] Cloud Computing Research, PDS Group, TU Delft http://www.pds.ewi.tudelft.nl/~iosup/research_cloud.html

[2] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li,‖ Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing‖ in IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 5, MAY 2011

[3] Cong Wang and Kui Ren, Wenjing Lou, Jin Li,‖ Toward Publicly Auditable Secure Cloud Data Storage Services‖ in IEEE Network July/August 2010

[4] G.Ateniese et al., ―Provable Data Possession at Untrusted Stores,‖ Proc. ACM CCS ‗07, Oct. 2007, pp. 598–609.

[5] M. A. Shah et al., ―Auditing to keep Online Storage Services Honest,‖ Proc.USENIX HotOS ‗07, May 2007.

[6] G. Ateniese et al., ―Scalable and Efficient Provable Data Possession,‖ Proc. SecureComm ‗08, Sept. 2008.

[7] H. Shacham and B. Waters, ―Compact Proofs of Retrievability,‖ Proc. Asia-Crypt ‗08, LNCS, vol. 5350, Dec. 2008, pp. 90–107.

[8] C.Wang et al.,‖Ensuring Data Storage Security in Cloud Computing,‖ Proc. IWQoS ‗09, July 2009, pp. 1–9.

[9] Q. Wang et al., ―Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing,‖ Proc. ESORICS ‗09, Sept. 2009, pp. 355–70.

[10] Cloud computing making virtual machines cloud ready, www.trendmicro.com/go/enterprise

[11] Xinmiao Zhang, and Keshab K. Parhi,”High-Speed VLSI Architectures for the AES Algorithm‖ in IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 12, NO. 9, SEPTEMBER 2004.

[12] SECURE HASH STANDARD by Federal Information Processing Standards Publication 180-2 2002 August 1

Untitled Page